Sciweavers

1898 search results - page 50 / 380
» Weak Keys for IDEA
Sort
View
ACISP
2007
Springer
14 years 2 months ago
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
In this paper, we present a forgery attack to a black-box traitor tracing scheme [2] called as CPP scheme. CPP scheme has efficient transmission rate and allows the tracer to ident...
Yongdong Wu, Feng Bao, Robert H. Deng
ESAW
2006
Springer
14 years 11 days ago
Current Issues in Multi-Agent Systems Development
Abstract. This paper surveys the state-of-the-art in developing multi-agent systems, and sets out to answer the questions: "what are the key current issues in developing multi...
Rafael H. Bordini, Mehdi Dastani, Michael Winikoff
JSS
2007
79views more  JSS 2007»
13 years 8 months ago
Security problems with improper implementations of improved FEA-M
This paper reports security problems with improper implementations of an improved version of FEA-M (fast encryption algorithm for multimedia). It is found that an implementation-d...
Shujun Li, Kwok-Tung Lo
CSEE
2009
Springer
14 years 3 months ago
An Examination of Learning Technologies That Support Software Engineering and Education
Advancing Software Engineering (SwE) through Education takes not only commitment and understanding of some key principals, but also requires a tight integration with technologies ...
Mel Rosso-Llopart
FCSC
2010
170views more  FCSC 2010»
13 years 6 months ago
Formal verification of concurrent programs with read-write locks
Abstract Read-write locking is an important mechanism to improve concurrent granularity, but it is difficult to reason about the safety of concurrent programs with read-write locks...
Ming Fu, Yu Zhang, Yong Li